Say

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

What!

Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

Events

Login Categories 9 Search Fees Locations 41 Organizers 8 Map

October Government Special Interest Group

2017 Drew Labbo $ 50.00 *

Sponsored By:   

www.proofpoint.com

This event providing 4 CPEs includes lunch and a hosted happy hour, along with a drawing for a gift!   

12 PM - 1 PM:   Lunch and Arrival

1 PM - 5 PM:   Speaker Sessions

5 PM - 6 PM:   Networking and Happy Hour

 
Session 1:   Law Enforcement Threat Briefing

FBI Special Agent

 

Session 2:  North Central All-Hazard Region (NCR) and Colorado Threat and Information Sharing Update (CTIS)

Tim McCain, CISO, City of Aurora

 

Session 3: Purchasing and Handling Crypto Currency from a Government Perspective

Trace Ridpath, Director IT Governance and Security, Colorado Office of Information Technology

 

Session 4:   Implementing DevSecOps in State Government

Rich Schliep, CISO, Colorado Department of State

 

Session 5:  CISO Panel

Debby Blyth, CISO, State of Colorado Governor's Office of Information Technology

Tim McCain, CISO, City of Aurora

Rich Schliep, CISO, Colorado Department of State

Thursday, 19. October 2017 - 12:00 till 18:00
Hard Rock Cafe 500 16th St, Denver, CO 80202

October Oil and Gas Special Interest Group

2017 Drew Labbo $ 50.00 *

Sponsored By:

 

This event providing 3 CPEs includes lunch and a hosted happy hour, along with a drawing for a gift!   

12 PM - 1 PM:   Lunch and Arrival

1 PM - 4 PM:   Speaker Sessions

4 PM - 5 PM:   Networking and Happy Hour

 
Session 1:   Digitization in Mid-Stream and Up-Stream

Susan Peterson, ABB

 

Session 2:  Connecting OT and IT - Secure SCADA Systems

Ed Turklaly, Baker Hughes

 

Session 3: CISO Roundtable

Rock Lambros, Markwest

Deon Mahaffie, Antero Resources

James Gaulke, PDC Energy

 

 

Thursday, 26. October 2017 - 12:00 till 17:00
Hard Rock Cafe 500 16th St, Denver, CO 80202

General Data Protection Regulation Training

This full day training session is free for ISSA Denver members and $120 for non-members

Sponsored by:

www.cyberark.com 

CyberArk is the only security company that proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise.  CyberArk pioneered a new category of targeted security solutions to protect against cyber threats before attacks escalate and cause irreparable business damage.

Topic: 

General Data Protection Regulation (GDPR)

The GDRP was approved and adopted by the European Union (EU) Parliament in April 2016.   The GDPR applies to organizations that process data about individuals in the context of selling goods or services to citizens, or monitoring the behavior of citizens, of the EU countries.   The regulation will take effect after a two year transition period and will be in force in May of 2018.   Join Pete Lindstrom as he provides an in-depth dive and discussion about GDPR.

Workshop Host: 

Pete Lindstrom is the Vice President for Security Strategies at IDC.   His mission is to enable digital transformation through appropriate IT adversarial risk management that supports efficient and effective economic decisions for security at digital scale.   Pete has almost 25 years experience in public accounting, enterprise audit and security, and at industry analyst research firms.   Prior to his career in information security, Pete served as a United States Marine.

Duration:

8:30 AM - 4:00 PM

6 CPEs

Breakfast and Lunch Provided

 

 

Thursday, 09. November 2017 - 08:30 till 16:00
Maggiano's Little Italy - 7401 S Clinton St, Englewood, CO 80112

November Chapter Meeting (Boulder)

Sponsored by:

  

Speaker:

Brian O'Neill
Sr Product Manager, Rapid7

Title:

HoneyPots: Diverting Attackers' Attention & Wasting Time

Abstract:

This presentation will take a look at honeypots as an effective tool for information security professionals, reviewing the most popular ones from low to high interaction. Additionally, we will cover the large-scale Rapid7 honeypot deployment, which utilizes a network of more than 130 low to mid interaction honeypots deployed around the globe in every major cloud provider, as well as several private networks. We will also review several modern-day attacks and highlight how the old threats are hard to re-mediate. 

Tuesday, 14. November 2017 - 11:30 till 13:30

November Chapter Meeting (Downtown)

Sponsored by:

  

Speaker:

Brian O'Neill
Sr Product Manager, Rapid7

Title:

HoneyPots:  Diverting Attackers' Attention & Wasting Time

Abstract:

This presentation will take a look at honeypots as an effective tool for information security professionals, reviewing the most popular ones from low to high interaction. Additionally, we will cover the large-scale Rapid7 honeypot deployment, which utilizes a network of more than 130 low to mid interaction honeypots deployed around the globe in every major cloud provider, as well as several private networks. We will also review several modern-day attacks and highlight how the old threats are hard to re-mediate. 

Tuesday, 14. November 2017 till Tuesday, 10. October 2017 17:30 - 19:30

November Chapter Meeting (DTC)

Sponsored by:

  

Speaker:

Brian O'Neill
Sr Product Manager, Rapid7

Title:

HoneyPots: Diverting Attackers' Attention & Wasting Time

Abstract:

This presentation will take a look at honeypots as an effective tool for information security professionals, reviewing the most popular ones from low to high interaction. Additionally, we will cover the large-scale Rapid7 honeypot deployment, which utilizes a network of more than 130 low to mid interaction honeypots deployed around the globe in every major cloud provider, as well as several private networks. We will also review several modern-day attacks and highlight how the old threats are hard to re-mediate. 

Wednesday, 15. November 2017 - 11:30 till 13:30

November Women in Security

2017 Joe Romero $ 25.00 *

Sponsor:

and

 

Presenters:

Sherrod DeGrippo Director of Emerging Threats
Proofpoint, Inc

Rinki Sethi, Senior Director, Information Security
Palo Alto Networks

Erika Noerenberg, Senior Malware Analyst
LogRhythm

 

Title:  

Emerging Threats; Perimeter, Data and End User

 

Abstract:  

We will have three successful and talented Women In Security present to our group under the headings of Perimeter (Palo Alto Networks), Data (LogRhythm) and End User (Proofpoint.). 

Each speaker will spend 15 -20 minutes talking about emerging threats and different ways of thinking in our security practices. After the presentations, we will break into individual discussion groups to share ideas and thoughts on the presentation topics. 

 

Speaker Bios:  

Check out our talented speakers' bios here!

Speaker Bios

 

Thursday, 16. November 2017 - 17:00 till 19:00

December Joint Chapter Meeting with ISACA

Topic: Re-Engineering IT and Controls using ISACA control frameworks, ITIL and ISO 27001

 

Agenda:

12:30 pm - 1:30 pm   Registration & Networking
2:00 pm - 2:10 pm     ISACA and ISSA Chapter Announcements
2:10 pm - 4:00 pm     Presentation in the Main Showroom
4:00 pm - 5:30 pm     Social Event/ Happy Hour (Lila B. Lounge)

Presentation Speaker:

 

Karen Worstell

 

Abstract:

After a disastrous CRM deployment on Oct 31, 2003, AT&T Wireless lost between 100-350M in one calendar quarter, enough to put the industry leader in GSM mobile service on the auction block. In the first year of accelerated filing for SOX 404, AT&T Wireless had to reengineer IT and pass its first SOX audit with zero deficiencies - in 10 months. There was zero time to allow for trial and error in our control design, implementation, testing, and documentation: it had to be done right on the very first try or the merger with Cingular, expected to be the largest cash acquisition in the history of the US, was off. 

This presentation covers a case study of leadership under pressure, using ISACA control frameworks, with ITIL and ISO 27001 in order to design and implement a control framework that all four audit firms called “a thing of beauty” and that prompted a six sigma study of our incident identification, management, and response processes. We will examine lessons learned about effective IT security and have time for Q&A. 

The speaker, Karen Worstell, was the CISO and VP of IT Risk Management for AT&T Wireless and led the successful SOX effort for the acquisition of AT&T Wireless by Cingular including all IT infrastructure controls and a total re-engineering of Disaster Recovery for AT&T Wirelesses data centers in a ten month period.

Thursday, 14. December 2017 - 12:30 till 17:30

Subscribe

Sign up to receive news
about our upcoming events

 

Recent Posts

View recent blog posts about
industry trends and events

View Blog